Shaarli export of all bookmarks on Mon, 22 Jan 18 22:16:07 -0500
- Cheap SSD drives: Where to buy them - The Silicon Underground
- Killing stuck process | Nbctcp's Weblog
- [Analysis] Full Duplex Capture in SCADA and Industrial Control Networks (by Thomas Tannhäuser and Alexander Pirogov)
- Famous cryptographers’ tombstone cryptogram decrypted – Naked Security
- SNMP-Brute - Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script - KitPloit - PenTest Tools for your Security Arsenal ☣
- How an ISO 27001 Foundation course can help build your career path – IT Governance Blog
- Organisations need to prepare for “cyber shocks” – IT Governance Blog
- Beginners Guide to Burpsuite Payloads (Part 1)
- 9 Steps to More-Effective Organizational Security
- Stuxnet: the father of cyber-kinetic weapons | CSO Online
- Intel tells customers to stop using its faulty Spectre patch
- 6 ways hackers will use machine learning to launch attacks | CSO Online
- How to Block USB Storage Devices in Linux Servers
- Ketshash - A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to remove Windows.old folder | Remko Weijnen's Blog (Remko's Blog)
- Spectre attacks: exploiting speculative execution | the morning paper
- Meltdown | the morning paper
- DashAsBinSh - Ubuntu Wiki
- Troy Hunt: Streamlining Data Breach Disclosures: A Step-by-Step Process
- The Life of Kenneth: Off-the-Grid Raspbian Repositories
- SwishDbgExt - Incident Response & Digital Forensics Debugging Extension - KitPloit - PenTest Tools for your Security Arsenal ☣
- Allscripts recovering from ransomware attack that has kept key tools offline | CSO Online
- Testing for New Japanese Era – I'm not a Klingon ( )
- Ensuring HTTP Strict Transport Security (HSTS) Compliance without System Modification – Powershell Automation – Michael Hansen (CSA/ASA)
- PowerShell for Programmers: Basic Syntax – Variables, Objects, and Data Types – Kory Thacher
- Azure CLI Image Copy Extension – allows you to copy virtual machine images between regions with just one command. – Microsoft Faculty Connection
- Serious about security? Check out Azure Security Center – Microsoft Press blog
- Troubleshooting Performance Issues with Cloud Services (PaaS) – Data Collection – Microsoft Azure Cloud Integration Engineering
- Spectre mitigations in MSVC | Visual C++ Team Blog
- socat as a handler for multiple reverse shells · System Overlord
- Top 20 OpenSSH Server Best Security Practices - nixCraft
- 10 bad DevOps habits to break | The Enterprisers Project
- How to deploy TripleO Overcloud (Controller, Compute) on CentOS 7 VMs
- macro_pack - Tool Used To Automatize Obfuscation And Generation Of Ms Office Documents For Pentest, Demo, And Social Engineering Assessments - KitPloit - PenTest Tools for your Security Arsenal ☣
- U.S. GAO - FDA Medical Device Reviews: Evaluation is Needed to Assure Requests for Additional Information Follow a Least Burdensome Approach
- Use PowerShell to create a bootable USB drive from a Windows 10 or Windows Server 2016 ISO – Mike F Robbins
- Securosis - Blog - Article
- The Tale of the Free-Net, the Cheap Way Dial-Up Users Got Online - Motherboard
- The Story of the Trackball, Canada's Earliest Gift to Computing - Motherboard
- Spectre and Meltdown: How Cache Works | Hackaday
- Finding Out Your Microsoft Office Licence Version | PeteNetLive
- The Idiot adds Two Factor Authentication to Proxmox – Jon Spraggins
- How TCP Works - MTU vs MSS (by Chris Greer)
- Ransomware shuts down Greenfield's Hancock Regional Hospital
- The Japanese words for "space" could change your view of the world — Quartz
- How to select the right Qualified Security Assessor – IT Governance Blog
- Podcast: Ready, set, now go GDPR
- How Microsoft tools and partners support GDPR compliance – Microsoft Secure
- Security Breaches Don't Affect Stock Price - Schneier on Security
- Some Basic Rules for Securing Your IoT Stuff — Krebs on Security
- Weekly podcast: Meltdown and Spectre SCADA problems, Apple text bomb and WEF cyber risks – IT Governance Blog
- Patch your vulnerabilities now or risk punishment under the GDPR – IT Governance Blog
- Is your organisation at risk from a cyber attack? – IT Governance Blog
- 7 ways ISO 20000 can benefit your organisation – IT Governance Blog
- Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems – Microsoft Secure
- Amazon seeks HIPAA compliance lead
- A technician's view of the GDPR and consent interfaces
- The real costs of a data breach – IT Governance Blog
- How to write an ISO 22301-compliant business continuity policy – IT Governance Blog
- Survey: Nurses, administrators confident organizations can handle breaches
- Nahra: Key issues for 2018 privacy and security checkup
- $17.2 Million Settlement for Breach Case Involving HIV Info
- Post Exploitation in Windows using dir Command
- Forensic Investigation of Nmap Scan using Wireshark
- 3 Years of Consulting: Settling into An Unexpected Career
- Is Healthcare Ready to Comply With GDPR? - HealthcareInfoSecurity
- Why Some Healthcare Entities Pay Ransoms - HealthcareInfoSecurity
- Where to Find Security Holes in Serverless Architecture
- Understanding Supply Chain Cyber Attacks
- Termux
- Which CISO 'Tribe' Do You Belong To?
- Living with Risk: Where Organizations Fall Short
- Doh!!! The 10 Most Overlooked Security Tasks
- A newcomer's guide to the dark web | CSO Online
- Contractor hacks former employer, destroys and corrupts data | CSO Online
- Listening to the echoes of cybersecurity history | CSO Online
- 6 reasons you’re failing to focus on your biggest IT security threats | CSO Online
- Full disk encryption: do we need it? | CSO Online
- What is Zero Trust? A model for more effective security | CSO Online
- Spectre and Meltdown explained: What they are, how they work, what's at risk | CSO Online
- 4n6k: Forensics Quickie: Methodology for Identifying Linux ext4 Timestamp Values in debugfs `stat` Command
- SQL Server on Linux and logging
- Charlie Munger’s Life as a Financial Independence Blueprint — My Money Blog
- Intel admits Spectre patch problems also affect newer Core chips
- Linux Foundation Certified Engineer (LFCE) Exam Review #LinuxFoundation @linuxfoundation #Linux #CentOS @sandervanvugt @tecmint #vExpert – vMusketeers
- Virtualization The Future: VMFS5 vs VMFS6
- Spectre and Meltdown – How to check patches are applied correctly? | viktorious.nl – Virtualization & Cloud Management
- How to Check and Patch Meltdown CPU Vulnerability in Linux
- EU GDPR and personal data in web server logs – Ctrl blog
- Why DevSecOps matters to IT leaders | The Enterprisers Project
- VCDX181.com - Supporting TLS v1.2 with PowerShell...
- Ansible - IP Sets and DShield Block List - EverythingShouldBeVirtual
- Powershell Script to Create Collections with Folder Structure – Cloud & Virtualization Complete Guide
- Guider - A System Wide Linux Performance Analyzer
- Collaboration in ownCloud/nextCloud with EtherPad and EtherCalc – – Unixblogger –
- SPARTA - Network Penetration Testing GUI Toolkit
- Kernelci.org automated bisection
- Meltdown and Its Networking Equivalents « ipSpace.net by @ioshints
- Best Practices Analyzer for Active Directory Domain Services | Microsoft Docs
- How to install and setup Docker on RHEL 7/CentOS 7 - nixCraft
- How to use Fio (Flexible I/O Tester) to Measure Disk Performance in Linux | WPMojo
- Amplify - NGINX Monitoring Made Easy
- Daily Mantra [SHIFT]
- More microcode madness – VMware recommends NOT patching | JonKensy.com
- NBlog - the NoticeBored blog: NBlog January 15 - protecting information in the cloud
- My AWS Solution Architect Associate exam experience | viktorious.nl – Virtualization & Cloud Management
- Spectre and Meltdown, what do we know about real-life performance impact so far? -
- Meltdown and Spectre side-channel attack risk mitigation information from processor, server, and software vendors | TinkerTry IT @ Home
- DSHR's Blog: It Isn't About The Technology
- RFCrack - A Software Defined Radio Attack Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- DNSExfiltrator - Data exfiltration over DNS request covert channel - KitPloit - PenTest Tools for your Security Arsenal ☣
- Splitting 835 Healthcare Claim Payment | Tallan's Technology Blog
- Find file names and URL of Windows 10 feature updates on WSUS | >_
- Cloud Native Part 6: Security - via @codeship | via @codeship
- More Business Travel Tied to More Signs of Anxiety & Depression, Health Risks
- Spectre and Meltdown on Oracle Public Cloud UEK - Blog dbi services
- Meltdown and Spectre flaws loomed large over CES
- AWS Security Checklist & Best Practices | Cloud Astronaut
- Intel Microcode for Spectre/CVE-2017-5715 – Real performance loss in ZFS | JonKensy.com
- Nutanix Cloud Connect and S3 Encryption - JBcomp.com
- XenApp and XenDesktop Service Architecture Poster | Ask the Architect
- PowerShell One-Liner to Audit Print Jobs on a Windows based Print Server – Mike F Robbins
- Useful links about Meltdown and Spectre | Techbrainblog
- The Idiot installs the QEMU agent on a Windows 10 VM on Proxmox – Jon Spraggins
- Cuckoo’s Egg – Week 6 Notes – Chris Sanders
- How to Emulate Android Apps on Linux
- 8 Android Settings You Should Change Right Now
- Add Table of Contents to Markdown
- Vagrant - Fixing Opentable Basebox looking for Windows Plugin
- Docker - Getting Started On Windows
- Docker - Mounting Windows Directories in Containers
- Docker - Running Container As a Service
- A Few Thoughts About Nonprofits and Digital Transformation in 2018 | Beth's Blog
- Machine Learning - Andrew Ng Week 2 - Big Data Beard
- Favorite Windows Shortcuts
- Presentation Environment Setup
- Vagrant Part 6 - Behind A Proxy Server
- Vagrant Part 5 - Installing Your Software
- Vagrant Part 4 - Install Boxstarter
- Vagrant Part 3 - Provisioning With Chocolatey
- Vagrant Part 2 - Provisioning Introduction
- Vagrant Part 1 - Easy Virtual Machine Management
- U.S. GAO - Information Technology: Agencies Need to Involve Chief Information Officers in Reviewing Billions of Dollars in Acquisitions
- The 348,296th Article About Cryptocurrency | Hackaday
- First Light: The Story of the Laser | Hackaday
- Justin James
- Seth's Blog: Getting paid what you deserve
- Justin James
- 100 Outstanding Pieces of Audio for 2017 – Bello Collective
- Sixty free lectures from Princeton on bitcoin and cryptocurrencies. Total time 13hr 20min. Links in post. : Bitcoin
- Think Intel ME was big? Meet Intel's new flaws: Meltdown and Spectre – Marksei
- Spectre and Meltdown: Attackers Always Have The Advantage | Hackaday
- Getting a Handle on Meltdown Update Impact, Stay Tuned for Spectre | Hackaday
- Meltdown Code Proves Concept | Hackaday
- sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR) - KitPloit - PenTest Tools for your Security Arsenal ☣
- Why you can’t cash out pt 3: Bitcoin is not a Ponzi scheme! It just works like one | Attack of the 50 Foot Blockchain
- GSEC vs. CISSP – The Personal Blog of Sean Goodwin
- Better GIAC Testing with Pancakes | tisiphone.net
- How to increase Linux security by disabling USB support - TechRepublic
- These are the cybersecurity concerns that keep execs up at night - TechRepublic
- Don't forget to go the 'last mile' on cybersecurity initiatives - TechRepublic
- Healthcare groups can be "perfect storm" of vulnerability to hackers - TechRepublic
- Wi-Fi security overhaul coming with WPA3 – Naked Security
- cSploit Android - The most complete and advanced IT security professional toolkit on Android - KitPloit - PenTest Tools for your Security Arsenal ☣
- Spectre/Meltdown on Oracle Public Cloud UEK - PIO - Blog dbi services
- Will technology companies be ready for the NIS Directive by May 2018? – IT Governance Blog
- Upcoming webinar: GDPR compliance: getting everyone in the organisation on board – IT Governance Blog
- What you need to know about data flow mapping under the GDPR – IT Governance Blog
- ACE - Automated, Collection, and Enrichment Platform - KitPloit - PenTest Tools for your Security Arsenal ☣
- Salamandra - Spy Microphone Detection Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Archery - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
- SNMPwn - An SNMPv3 User Enumerator and Attack tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Anubis - Subdomain Enumeration And Information Gathering Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Wapiti 3.0.0 - The Web-Application Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- When Did IT Practitioners Lose Their Curiosity? « ipSpace.net by @ioshints
- Book Review: Clean Architecture | Adventures in the programming jungle
- Storaji - A Free, Modern Lightweight Inventory Management System
- Cybersecurity: Time for a New Definition - Lawfare
- How to Install Snipe-IT Asset Management Software on Debian 9
- Raspberry Pi Zero WH SBCs Are Now Available with Professionally Soldered Headers
- The unexpected benefits of ISO 27001 – IT Governance Blog
- Essential guidance to prevent business continuity disasters – IT Governance Blog
- Understanding PCI compliance auditing – IT Governance Blog
- IOActive Labs Research: SCADA and Mobile Security in the IoT Era
- GDPR: What US Healthcare Entities Need to Know
- Rising Attack Vector for Industrial IoT: Smartphone Apps
- 3 more little-known secrets about cloud security | CSO Online
- Board cybersecurity field trips | CSO Online
- How to Configure Suricata IDS in Ubuntu
- Patch Now or Risk GDPR Fines Later, Regulator Warns
- 8 simple ways to promote team communication | Opensource.com
- A Step in the Right Direction: House Passes the Cyber Vulnerability Disclosure Reporting Act | Electronic Frontier Foundation
- Markets Rise and Fall: Is Your Portfolio Ready For Both? — My Money Blog
- How to write a job description for a chief information security officer | CSO Online
- Thinking Smartly About Smart Contracts | DennisKennedy.Blog
- CISOs' Cyber War: How Did We Get Here?
- 'Back to Basics' Might Be Your Best Security Weapon
- Encrypt Tablespaces – Multitenant | EzDBA – BLOG
- Oracle Linux patches for Meltdown and Spectre information – Oracle 48
- Akiee - Rockiger
- Spectre and Meltdown, Oracle Database, AWS, SLOB - Blog dbi services
- Benchmarking Linux With The Retpoline Patches For Spectre - Phoronix
- This is what a 50-qubit quantum computer looks like
- Automating the detection of Mimikatz with ELK – JP
- ADRecon - Tool Which Gathers Information About The Active Directory - KitPloit - PenTest Tools for your Security Arsenal ☣
- LaZagne v2.3 - Credentials Recovery Project - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to achieve an effective risk assessment – IT Governance Blog
- Ed Amoroso on CISOs' Challenges in 2018 - HealthcareInfoSecurity
- Network Packet Forensic using Wireshark
- How to develop a robust cyber security policy – IT Governance Blog
- What Global Manufacturers Need to Know About Security in the Cloud
- Serious Meltdown and Spectre Flaws Make CPUs Exploitable
- Hack the Basic Penetration VM (Boot2Root Challenge)
- TCP & UDP Packet Crafting with CatKARAT
- Spectre? Meltdown? F*CKWIT? Calm down and make yourself some tea
- Apple fixes the Meltdown and Spectre flaws in Macs, iPhones, and iPads
- Bitcoin proving big hit in Japan - Japan Today
- Errata Security: Some notes on Meltdown/Spectre
- Errata Security: Why Meltdown exists
- Errata Security: Let's see if I've got Metldown right
- How to Assess a Vendor's Data Security | Electronic Frontier Foundation
- Google Online Security Blog: More details about mitigations for the CPU Speculative Execution issue
- Spectre and Meltdown: What you need to know going forward | CSO Online
- Vulnerability Management: The Most Important ...
- The hackers are coming: 6 cloud computing trends you will see in 2018 | CSO Online
- The Top Four Exception Tracking Services - via @codeship | via @codeship
- Improve SAP BW Performance by Applying the Flat Cube | Running SAP Applications on the Microsoft Platform
- How the Cloud Delivers Greater ROI than On-Prem IT Solutions | ProfitBricks Blog
- Radiology Roundup: Insights on Emerging Trends
- 5 Trends that Will Shape Radiology in 2018
- DSHR's Blog: Meltdown & Spectre
- New Tool – Disk Hogs | Keith's Consulting Blog
- Justin James
- Open Source with Christopher Lydon - Christopher Lydon in conversation on arts, ideas and politics
- GitHub - ossu/computer-science: Path to a free self-taught education in Computer Science!
- Real World Computing: Archiving Mailboxes in the Office 365 World
- Analyzing credit card transactions using machine learning techniques – 2 – David Vassallo's Blog
- Selecting a Cloud Provider - Code as Craft
- 3 New Year's Rituals for Nonprofit Professionals To Begin 2018 with Clarity | Beth's Blog
- Bullet Journal - The Analog System for the Digital Age
- 2017: Year of the data breach
- Ex-NSA contractor will plead guilty to stealing 50TB of data
- Podcast 370 - Cord Cutting Special - Todd Klindt's SharePoint Admin Blog
- Mapping the VCDX Defense Genome Part 3: Is All Flash a Trap?! – vMusketeers
- About CPU bug aka #Meltdown / #Spectre | >_
- Making Ubuntu on Windows a bit more Authentic (by fixing the font)
- Get the content of the WindowsUpdate log as an object | >_
- BakAndImgCD - home
- Docker Security & Container Security Platform | Twistlock
- Xamarin Android Player - Xamarin
- Building a NAS
- Linux resolutions for 2018 | Network World
- The Best Free Microsoft Office Calendar Templates for the New Year